25 November 2019

SOCIAL

LATEST TWEETS

Programme

Session One – Cyber Risk Mitigation and Management Strategies

From the board to the IT department, our morning session looks at how enterprises can prioritise risks and create strategies that efficiently prevent and detect threats. We explore:

Risk mitigation for digital transformation strategies

The importance of an engaged executive suite in cybersecurity

Designing risks assessments

Prioritising cultural challenges for risk mitigation

Data Risk Management best practices

Effective risk management strategies and risk metrics

Defending against threats through strategic partnerships

09:00

Conference Chair’s Opening Address

09:15

Morning Keynote - Smart risk-takers in digital transformation

Only 22% of chief executives believe the risk exposure data they receive to be comprehensive enough to inform their data-driven decisions – a figure that has remained unchanged for the past 10 years. Smart risk management professionals far from obstructing digital initiatives can help their enterprises meet or beat their digital transformation goals. We explore:

When to begin assessing risk for your digital transformation strategy

Why an engaged executive suite in cybersecurity drive business growth

Where successful digital risk-handlers stand out

What effective risk managers can bring to help establish digital governance, source talent, find the right fit for emerging technologies and engage key stakeholders of digital initiatives.

09:35

The role of the CISO - The Security Leader’s Play Book

Today the CISO must identify themselves as a business enabler and, just as critically, they must be recognised in the same way by others—from the boardroom to the executive suite to the multiple lines of departments. To enable the business, the CISO must speak the language of business; it is no longer a job that fundamentally implies managing the firewall and securing the perimeter against threats.

With digital technologies infused in every gear of the business machinery, cyber risk has been elevated but so has the value and importance of the CISO to the executive suite. What are today’s key attributes of an effective CISO? How will the position evolve in the upcoming years? Is there a talent shortage for the CISO role? We explore CISOs’ key challenges and the security leader’s horizon.

09:55

Make the Business Case: Articulating Risk to the Board

Just a small percentage of boards report having a full level of engagement regarding cybersecurity and digital transformation, and more importantly, very few — 5 per cent or less — full-board meetings focus on cybersecurity.

Join this session to:

Understand the importance of articulating cybersecurity risk to the board

Learn ways to frame strategic cybersecurity discussions that are more akin to the way organisations consider other risks

Elevate the discussion to financial risks – how to present business metrics and market growth to impact decision-makers

Acquire tools that leverage storytelling to create compelling cases

10:15

Creating a Risk-Aware Culture to Mitigate Risk

With more than 60% of incidents being credited to the human factor of cyber risk, more enterprises are looking for the root causes of risky employee behaviours and the aspects of workplace culture that could positively contribute to mitigating this risk. We consider:

The importance of creating a risk-aware culture

Gathering incident benchmarks that help prioritise culture challenges and needs

Obtaining ideas for improvement directly from employees

Segmenting the workforce to identify the most vulnerable populations

Identifying the practices that drive security-conscious behaviours

10:35

Data Risk Management: Protect your Critical Data

An exponential amount of data is being created and monetised around the globe, and such data growth means new liabilities and risks. With the global average cost of a data breach reaching $3.86 million, it is high time for enterprises to reinforce their data risk management approaches. In this presentation, we cover:

10:55

Questions To The Panel Of Speakers

11:10

Refreshment Break Served in the Exhibition Area

11:40

While the threat from hackers and fraudsters continues growing, a small group of UK banks and law enforcement agencies called the Cyber Defence Alliance are working together to share cyber security intelligence and combat threats.

This notable collaboration builds up casework for law enforcement to better investigate, capture and convict cybercriminals to transform the UK financial services sector in a more robust target and a safer industry. We distil key lessons of this alliance with generalizable takeaway lessons for other sectors.

11:55

Cyber Risk Metrics: How to measure a fast-moving target

While new tech introduces a dependency that didn’t exist before, new opportunities arise for cybercriminals to exploit. The variables in the cybersecurity landscape are continually evolving. Efficiently and objectively identifying ever-changing risks is the foundation of cybersecurity strategies and responses. We look at:

Defining and measuring risk – why it matters and how it can be integrated into organisational risk strategies

The importance of identifying your liabilities to create contingency plans

Identifying and establishing meaningful metrics for your responsibilities and vulnerabilities

How machine learning is helping to drive predictive protection to detect moving targets

13:00

Networking Lunch Served in the Exhibition Area

Predictive Prioritisation of risks to tackle your main vulnerabilities

Exploring cloud security risks and vulnerabilities

Implementing DevSecOps to achieve cyber resilience

Understanding the threat landscape

14:00

Conference Chair’s Afternoon Address

14:05

Predictive Prioritisation: How to focus on the most critical vulnerabilities

With CVSS disclosing more than 15,000 new vulnerabilities per year – most of them categorised as high or critical – how can you identify the biggest threats to your business, and know what to patch first? We explore:

14:20

Cloud Security: Evaluating risks, suppliers and vulnerabilities

More than 40% of organisations report every year an attack on their cloud environments, but more than half of the enterprises had easily remediable network vulnerabilities. This presentation will demystify the intricacy of cloud security, its suppliers and security solutions, and how you can:

14:50

Questions to the Panel of Speakers

15:00

Afternoon Networking and Refreshments served in the Exhibition Area

15:30

How to Securely Embed Disruptive Technologies into Your Organisation

The rules of the game are changing as more disruptive technologies colonise modern enterprises. Organisations are looking forward to unlocking their fullest potential, but how can this be done with minimal risk? We explore:

How can the risk associated be mitigated (e.g. ensuring accurate and free of prejudice data in your AI model)

Discussing the need for current regulatory guidelines to evolve as fast as technology is

15:45

AI: a target and a tool

AI has been improving security, and it has not gone unnoticed by attackers. But what is today a tool for security teams could very well become the next target of attack. As we become more reliant on AI/ML, there is an increasing need to understand how adversaries can attack security solutions based on ML at training and prediction stages, or how ML can accelerate innovation in attackers’ techniques.

In this presentation, we consider different scenarios to understand the security issues that AI and ML introduce to organisations.

16:00

Closing Keynote: How companies can proactively prepare themselves for the evolving threat landscape

What are the risks plaguing enterprises today? Which new risks are on the horizon? What should companies be doing to prepare for the risks of tomorrow? Join this session to:

Assess your company’s approach: proactive, reactive or both

Improve your current practices with practical adjustments

Understand which risk management strategies actually generate risk

Learn which methods are beyond saving, and worse than doing nothing

Discover the future threat landscape

16:15

Questions to the Panel of Speakers

16:25

Closing Remarks from the Conference Chair

16:30

Conference Closes

Please note:Whitehall Media reserve the right to change the programme without prior notice.